!vxTmkuJzhGPsMdkAOc:transformierende-gesellschaft.org

NixOS Matrix Subsystem

127 Members
Coordination and discussion about the matrix subsystem in NixOS - https://nixos.wiki/wiki/Matrix64 Servers

Load older messages


SenderMessageTime
15 Mar 2023
@hexa:lossy.networkhexabecause so far we only have out-of-tree solution13:27:48
@hexa:lossy.networkhexa * because so far we only have the out-of-tree solution13:28:14
@dandellion:dodsorf.asDandellionI can just upstream the worker.instance stuff first ig13:28:15
@hexa:lossy.networkhexaprobably for the best13:28:25
@hexa:lossy.networkhexawould be happy to review13:28:49
@dandellion:dodsorf.asDandellionmaybe this weekend then :)13:28:53
19 Mar 2023
@motiejus:jakstys.ltmotiejus

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to it). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles`. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:11:28
@motiejus:jakstys.ltmotiejus *

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles`. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:11:48
@motiejus:jakstys.ltmotiejus *

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles\. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:12:03
@motiejus:jakstys.ltmotiejus also, somewhat related question about mautrix-facebook.nix: I am looking how to pass hs_token and as_token via registrationData, however, I am not clear how to not add the secrets to the nix store. These tokens are in separate files (like in my question below); any ideas how to pass them to the service? 19:59:06
21 Mar 2023
@motiejus:jakstys.ltmotiejus
In reply to @motiejus:jakstys.lt

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles\. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

I did exactly this , and it seems to work (except for a tidbit with signing_key_path, which I suggest a fix in https://github.com/NixOS/nixpkgs/pull/222336 )
11:23:28
@motiejus:jakstys.ltmotiejus
In reply to @motiejus:jakstys.lt

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles\. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

* I did exactly this , and it seems to work (except for a tidbit with signing_key_path, which I suggest a fix in https://github.com/NixOS/nixpkgs/pull/222336
11:23:30
24 Mar 2023
@hexa:lossy.networkhexahow is everyone else dealing with element and the read marker issues02:40:58
@hexa:lossy.networkhexathreading is now enabled by default, no opt-out, but "mark as read" doesn't clear the read marker for some rooms02:41:19
@hexa:lossy.networkhexawhen starting element, lots of already read stuff reappears as read02:41:39
@hexa:lossy.networkhexait takes the joy out of matrix for me big time02:41:46
@sandro:supersandro.deSandro 🐧I sometimes send "spam" messages 13:51:58
@n0emis:noemis.me@n0emis:noemis.meYep, same. Somehow I don’t have this issue on iOS or with syncv3 enabled, although that brings a whole new set if bugs15:00:39
@n0emis:noemis.me@n0emis:noemis.me* Yep, same. Somehow I don’t have this issue on iOS or with syncv3 enabled, although that brings a whole new set of bugs15:00:39
25 Mar 2023
@julian:foad.me.uk@julian:foad.me.uk changed their profile picture.21:09:20
28 Mar 2023
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/22233612:11:23
@hexa:lossy.networkhexahttps://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0/22:59:07
@hexa:lossy.networkhexa
pkgs/servers/monitoring/matrix-alertmanager/yarn.lock
2044:matrix-js-sdk@^12.5.0:
23:23:55
* @dandellion:dodsorf.asDandellion wonders if his federation is broken23:01:00
@hexa:lossy.networkhexa
pkgs/applications/networking/instant-messengers/matrix-recorder/node-packages.nix
574:    "matrix-js-sdk-0.7.13" = {
23:24:06
@hexa:lossy.networkhexaand of cours element, cinny and schildichat23:24:25
29 Mar 2023
@dandellion:dodsorf.asDandellionmy federation, was, in fact broken04:48:33
30 Mar 2023
@hexa:lossy.networkhexahttps://github.com/SchildiChat/schildichat-desktop/releases/tag/v1.11.26-sc.123:09:47
@hexa:lossy.networkhexaschildichat is still behind, someone please?23:09:52
31 Mar 2023
@hexa:lossy.networkhexahttps://github.com/vector-im/element-web/releases/tag/v1.11.2711:45:14

Show newer messages


Back to Room ListRoom Version: 4